Texas Health and Human Services System logo
HHS Computer Usage and Information Security Training
Module 1: Introduction
Outline - opens course outline in a new window
Help - opens Help menu in a new window
Close course - closes course
2. Why Information Security? Back
3 of 8
Next

Why Computer Information Security?

There are several guidelines in place to ensure information is protected. A few of the guidelines that you will need to become familiar with are the HHS Human Resource (HR) Work Rules found in your HHS HR Manual, the Texas Health and Human Services (HHS) Enterprise Security Policy Standards and Guidelines (ESPSG), the Health Insurance Portability and Accountability Act (HIPAA), and other state and federal security laws. Although you will not be tested on every word within these guidelines, it is important that you become familiar with them.

Failure to follow agency policies, procedures, and laws of the State of Texas, in addition to federal laws, may result in the loss of access to the computer system(s) and/or disciplinary action, which may include dismissal and/or criminal prosecution.

 

 

the Texas Health and Human Services Commission logo.

Instructions Click or select the NEXT button above to continue.
Previous Lesson
  Next Module